Пожалуйста, обратите внимание, что пользователь заблокирован
GitHub - enkomio/AlanFramework: A C2 post-exploitation framework
A C2 post-exploitation framework. Contribute to enkomio/AlanFramework development by creating an account on GitHub.
GitHub - sweetsoftware/Ares: Python botnet and backdoor
Python botnet and backdoor. Contribute to sweetsoftware/Ares development by creating an account on GitHub.
GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C# (RAT)
Open-Source Remote Administration Tool For Windows C# (RAT) - NYAN-x-CAT/AsyncRAT-C-Sharp
GitHub - Gr1mmie/AtlasC2: C# C2 Framework centered around Stage 1 operations
C# C2 Framework centered around Stage 1 operations - GitHub - Gr1mmie/AtlasC2: C# C2 Framework centered around Stage 1 operations
GitHub - UnkL4b/BabyShark: Basic C2 Server
Basic C2 Server. Contribute to UnkL4b/BabyShark development by creating an account on GitHub.
Kevin Clark / Badrats · GitLab
Badrat C2 -- Python server, JScript, Powershell, and C# implants, HTTP(S) and SMB comms. Not a good C2.
GitHub - loseys/BlackMamba: C2/post-exploitation framework
C2/post-exploitation framework. Contribute to loseys/BlackMamba development by creating an account on GitHub.
Brute Ratel C4
A Customized Command and Control Centre for Red Team and Adversary Simulation
bruteratel.com
GitHub - FSecureLABS/C3: Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits. - GitHub - FSecureLABS/C3: Custom Comma...
GitHub - FSecureLABS/C3: Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits. - GitHub - FSecureLABS/C3: Custom Comma...
GitHub - mitre/caldera: Automated Adversary Emulation Platform
Automated Adversary Emulation Platform. Contribute to mitre/caldera development by creating an account on GitHub.
GitHub - 3xpl01tc0d3r/Callidus
Contribute to 3xpl01tc0d3r/Callidus development by creating an account on GitHub.
GitHub - tiagorlampert/CHAOS: CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.
:fire: CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems. - GitHub - tiagorlampert/CHAOS: CHAOS is a free and open-source R...
Cobalt Strike | Adversary Simulation and Red Team Operations
Cobalt Strike in an adversary simulation tool that can emulate the tactics and techniques of a quiet long-term embedded threat actor in an IT network using Beacon, a post-exploitation agent and covert channels.
GitHub - cobbr/Covenant: Covenant is a collaborative .NET C2 framework for red teamers.
Covenant is a collaborative .NET C2 framework for red teamers. - GitHub - cobbr/Covenant: Covenant is a collaborative .NET C2 framework for red teamers.
GitHub - crawl3r/DaaC2: Discord as a C2
Discord as a C2. Contribute to crawl3r/DaaC2 development by creating an account on GitHub.
GitHub - h0mbre/Dali
Contribute to h0mbre/Dali development by creating an account on GitHub.
Image-Based C2 Channel Proof-of-Concept
IntroductionIn late-November I decided to try and start a project that would be both fun and educational. I settled on trying to come up with a somewhat creative C2 channel proof-of-concept that involved steganography and a somewhat trusted domain instead of bespoke infrastructure. I don’t know...
h0mbre.github.io
GitHub - hyp3rlinx/DarkFinger-C2: Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software
Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software - GitHub - hyp3rlinx/DarkFinger-C2: Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software
GitHub - Arno0x/DBC2: DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means of communication.
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a mea...
GitHub - qwqdanchun/DcRat: A simple remote tool in C#.
A simple remote tool in C#. Contribute to qwqdanchun/DcRat development by creating an account on GitHub.
GitHub - DeimosC2/DeimosC2: DeimosC2 is a Golang command and control framework for post-exploitation.
DeimosC2 is a Golang command and control framework for post-exploitation. - GitHub - DeimosC2/DeimosC2: DeimosC2 is a Golang command and control framework for post-exploitation.
GitHub - 3ct0s/disctopia-c2: Windows Remote Administration Tool that uses Discord as C2
Windows Remote Administration Tool that uses Discord as C2 - GitHub - 3ct0s/disctopia-c2: Windows Remote Administration Tool that uses Discord as C2
GitHub - lucasjacks0n/EggShell: iOS/macOS/Linux Remote Administration Tool
iOS/macOS/Linux Remote Administration Tool. Contribute to lucasjacks0n/EggShell development by creating an account on GitHub.
GitHub - jm33-m0/emp3r0r: Linux/Windows post-exploitation framework made by linux user
Linux/Windows post-exploitation framework made by linux user - GitHub - jm33-m0/emp3r0r: Linux/Windows post-exploitation framework made by linux user
GitHub - Marten4n6/EvilOSX: An evil RAT (Remote Administration Tool) for macOS / OS X.
An evil RAT (Remote Administration Tool) for macOS / OS X. - Marten4n6/EvilOSX
GitHub - monoxgas/FlyingAFalseFlag: Slides and Code for the BHUSA 2019 talk: Flying a False Flag
Slides and Code for the BHUSA 2019 talk: Flying a False Flag - GitHub - monoxgas/FlyingAFalseFlag: Slides and Code for the BHUSA 2019 talk: Flying a False Flag
GitHub - Ziconius/FudgeC2: FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities. - Ziconius/FudgeC2
GitHub - looCiprian/GC2-sheet: GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive. - GitHub - looCiprian/GC2-sheet...
GitHub - SaturnsVoid/GoBot2: Second Version of The GoBot Botnet, But more advanced.
Second Version of The GoBot Botnet, But more advanced. - SaturnsVoid/GoBot2
GitHub - sensepost/godoh: 🕳 godoh - A DNS-over-HTTPS C2
🕳 godoh - A DNS-over-HTTPS C2. Contribute to sensepost/godoh development by creating an account on GitHub.
GitHub - r3nhat/GRAT2: We developed GRAT2 Command & Control (C2) project for learning purpose.
We developed GRAT2 Command & Control (C2) project for learning purpose. - GitHub - r3nhat/GRAT2: We developed GRAT2 Command & Control (C2) project for learning purpose.
GitHub - onSec-fr/Http-Asynchronous-Reverse-Shell: [POC] Asynchronous reverse shell using the HTTP protocol.
[POC] Asynchronous reverse shell using the HTTP protocol. - GitHub - onSec-fr/Http-Asynchronous-Reverse-Shell: [POC] Asynchronous reverse shell using the HTTP protocol.
GitHub - 3v4Si0N/HTTP-revshell: Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware
Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware - GitHub - 3v4Si0N/HTTP-revshell: Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware
GitHub - Telefonica/ibombshell: Tool to deploy a post-exploitation prompt at any time
Tool to deploy a post-exploitation prompt at any time - GitHub - Telefonica/ibombshell: Tool to deploy a post-exploitation prompt at any time
Innuendo
GitHub - roadwy/RIP
Contribute to roadwy/RIP development by creating an account on GitHub.
GitHub - postrequest/link: link is a command and control framework written in rust
link is a command and control framework written in rust - GitHub - postrequest/link: link is a command and control framework written in rust
GitHub - Kudaes/LOLBITS: ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.
** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion. - GitHub - Kudaes...
GitHub - cedowens/MacC2: python-based Mac Command and Control that uses internal API calls instead of command line utilities. Author: Cedric Owens
python-based Mac Command and Control that uses internal API calls instead of command line utilities. Author: Cedric Owens - GitHub - cedowens/MacC2: python-based Mac Command and Control that uses i...
GitHub - cedowens/MacShellSwift: Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedric Owens
Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedric Owens - GitHub - cedowens/MacShellSwift: Proof of concept ...
GitHub - nickvangilder/most-average-c2-ever: The most average C2 ever (MACE)
The most average C2 ever (MACE). Contribute to nickvangilder/most-average-c2-ever development by creating an account on GitHub.
GitHub - iammaguire/MeetC2: Modular C2 framework aiming to ease post exploitation for red teamers.
Modular C2 framework aiming to ease post exploitation for red teamers. - GitHub - iammaguire/MeetC2: Modular C2 framework aiming to ease post exploitation for red teamers.
GitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. - Ne0nd0g/merlin
GitHub - rapid7/metasploit-framework: Metasploit Framework
Metasploit Framework. Contribute to rapid7/metasploit-framework development by creating an account on GitHub.
GitHub - degenerat3/meteor: A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go. - GitHub - degenerat3/meteor: A cross-platform C2/teamserver supporting multiple transport protocols, written ...
GitHub - r00t-3xp10it/meterpeter: C2 Powershell Command & Control Framework with BuiltIn Commands
C2 Powershell Command & Control Framework with BuiltIn Commands - GitHub - r00t-3xp10it/meterpeter: C2 Powershell Command & Control Framework with BuiltIn Commands
GitHub - Cr4sh/MicroBackdoor: Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ] - GitHub - Cr4sh/MicroBackdoor: Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
PurpleTeamSummit/Summit-May2021 at main · mlgualtieri/PurpleTeamSummit
Contribute to mlgualtieri/PurpleTeamSummit development by creating an account on GitHub.
GitHub - IncideDigital/Mistica: An open source swiss army knife for arbitrary communication over application protocols
An open source swiss army knife for arbitrary communication over application protocols - GitHub - IncideDigital/Mistica: An open source swiss army knife for arbitrary communication over applicati...
GitHub - MythicAgents/Apollo: A .NET Framework 4.0 Windows Agent
A .NET Framework 4.0 Windows Agent. Contribute to MythicAgents/Apollo development by creating an account on GitHub.
GitHub - gl4ssesbo1/Nebula: Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps C...
Nighthawk - MDSec
What is Nighthawk? Nighthawk is the most advanced and evasive command-and-control framework available on the market. Designed for lawful red team operations, Nighthawk empowers red teams. Built with operational security...
GitHub - EnginDemirbilek/NorthStarC2: Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalware #CnC #infosec #offensivesecurity #Trojan
Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalware #CnC #infosec #offensivesecurity #Trojan - GitHub - Eng...
GitHub - p3nt4/Nuages: A modular C2 framework
A modular C2 framework. Contribute to p3nt4/Nuages development by creating an account on GitHub.
GitHub - mhaskar/Octopus: Open source pre-operation C2 server based on python and powershell
Open source pre-operation C2 server based on python and powershell - mhaskar/Octopus
GitHub - mttaggart/OffensiveNotion: Notion as a platform for offensive operations
Notion as a platform for offensive operations. Contribute to mttaggart/OffensiveNotion development by creating an account on GitHub.
OYABUN
redcodelabs.io
GitHub - lapolis/palinka_c2: Just another useless C2 occupying space in some HDD somewhere.
Just another useless C2 occupying space in some HDD somewhere. - GitHub - lapolis/palinka_c2: Just another useless C2 occupying space in some HDD somewhere.
GitHub - fozavci/petaqc2: Petaq - Purple Team Command & Control Server
Petaq - Purple Team Command & Control Server. Contribute to fozavci/petaqc2 development by creating an account on GitHub.
Overview — PoshC2
GitHub - AdrianVollmer/PowerHub: A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting - GitHub - AdrianVollmer/PowerHub: A post exploitation tool based on a we...
GitHub - preludeorg/operator-support: Operator: an autonomous red team command-and-control platform to make security testing more accessible.
Operator: an autonomous red team command-and-control platform to make security testing more accessible. - GitHub - preludeorg/operator-support: Operator: an autonomous red team command-and-control ...
Prismatica
PRISMatica: Responsive Command and Control System. Prismatica has 21 repositories available. Follow their code on GitHub.
SimpleSite.com
Быстро и легко — самый популярный конструктор сайтов в мире без рекламы и с возможностью использования индивидуального доменного имени. Воспользуйтесь SimpleSite.com совершенно бесплатно прямо сейчас!
GitHub - n1nj4sec/pupy: Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C - n1nj4sec/pupy
GitHub - quasar/Quasar: Remote Administration Tool for Windows
Remote Administration Tool for Windows. Contribute to quasar/Quasar development by creating an account on GitHub.
GitHub - FrenchCisco/RATel: RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the comma...
GitHub - redherd-project/redherd-framework: RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets. - GitHub - redherd-project/redherd-framework: RedHerd is a collaborative and serv...
GitHub - d4rk007/sak1to-shell: Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.
Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C. - GitHub - d4rk007/sak1to-shell: Multi-threaded, multi-os/platform (Linux/Windows...
GitHub - jafarlihi/serpentine: C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends - jafarlihi/serpentine
GitHub - bats3c/shad0w: A post exploitation framework designed to operate covertly on heavily monitored environments
A post exploitation framework designed to operate covertly on heavily monitored environments - bats3c/shad0w
GitHub - shadow-workers/shadow-workers: Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW) - GitHub - shadow-workers/shadow-workers...
GitHub - SharpC2/SharpC2 at dev
Command and Control Framework written in C#. Contribute to SharpC2/SharpC2 development by creating an account on GitHub.
GitHub - byt3bl33d3r/SILENTTRINITY: An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR - GitHub - byt3bl33d3r/SILENTTRINITY: An asynchronous, collaborative post-exploitation agent powered by P...
GitHub - praetorian-inc/slack-c2bot: Slack C2bot that executes commands and returns the output.
Slack C2bot that executes commands and returns the output. - GitHub - praetorian-inc/slack-c2bot: Slack C2bot that executes commands and returns the output.
GitHub - n00py/Slackor: A Golang implant that uses Slack as a command and control server
A Golang implant that uses Slack as a command and control server - GitHub - n00py/Slackor: A Golang implant that uses Slack as a command and control server
GitHub - BishopFox/sliver: Adversary Emulation Framework
Adversary Emulation Framework. Contribute to BishopFox/sliver development by creating an account on GitHub.
GitHub - NetSPI/SQLC2: SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and the agent.
SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and the agent. - GitHub - NetSPI/SQLC2: SQLC2 is a PowerShell s...
GitHub - silentbreaksec/Throwback: HTTP/S Beaconing Implant
HTTP/S Beaconing Implant. Contribute to silentbreaksec/Throwback development by creating an account on GitHub.
GitHub - Mr-Un1k0d3r/ThunderShell: Python / C# Unmanaged PowerShell based RAT
Python / C# Unmanaged PowerShell based RAT . Contribute to Mr-Un1k0d3r/ThunderShell development by creating an account on GitHub.
GitHub - lu4p/ToRat: ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication - GitHub - lu4p/ToRat: ToRat is a Remote Administation tool written in Go using Tor a...
GitHub - trustedsec/trevorc2: TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution. - GitHub - trustedsec/trevorc2: TrevorC2 is a legitimate website (browsable) tha...
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities. - GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, lib...
GitHub - sogonsec/Clutching-Pearls-C2_old_qt5: Clutching Pearls C2 is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff. WIP.
Clutching Pearls C2 is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff. WIP. - GitHub - sogonsec/Clutching-Pearls-C2_old_qt5: Clut...
GitHub - FULLSHADE/WarFox: A proof-of-concept HTTPS beaconing Windows implant and multi-layered proxy C2 network designed for covert APT emulation engagements
A proof-of-concept HTTPS beaconing Windows implant and multi-layered proxy C2 network designed for covert APT emulation engagements - GitHub - FULLSHADE/WarFox: A proof-of-concept HTTPS beaconing W...
GitHub - facebookarchive/WEASEL: DNS covert channel implant for Red Teams.
DNS covert channel implant for Red Teams. Contribute to facebookarchive/WEASEL development by creating an account on GitHub.
GitHub - pucarasec/zuthaka: Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.
Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools. - GitHub - pucarasec/zuthaka: Zu...